Hard1 markMultiple Choice
AZ-900 · Question 33 · Domain 2.5: Azure Identity, Access, and Security
Which security model assumes that every request is a potential breach and verifies it regardless of where it originates?
Which security model assumes that every request is a potential breach and verifies it regardless of where it originates?
Answer options:
A.
Defense in depth
B.
Zero Trust
C.
Role-Based Access Control (RBAC)
D.
Perimeter security
How to approach this question
Identify the model that operates on the principle of 'never trust, always verify'.
Full Answer
B.Zero Trust✓ Correct
Zero Trust
Zero Trust is a security model that assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to 'never trust, always verify'.
Common mistakes
Confusing Zero Trust with Defense in Depth. Defense in Depth is about layering security; Zero Trust is about identity and verification at every step.
Practice the full Azure Fundamentals AZ-900 Practice Exam 3
60 questions · hints · full answers · grading
More questions from this exam
Q01What is the best definition of cloud computing?EasyQ02True or False: In a public cloud model, you are responsible for managing and maintaining the phys...EasyQ03Which cloud model allows a company to maintain strict control over highly sensitive data on-premi...MediumQ04What is the primary benefit of 'high availability' in cloud computing?EasyQ05Which term describes the ability to automatically increase or decrease compute resources based on...Easy
Expert